On the Use of Neurosymbolic AI for Defending Against Cyber Attacks

被引:0
|
作者
Grov, Gudmund [1 ,2 ]
Halvorsen, Jonas [1 ]
Eckhoff, Magnus Wiik [1 ,2 ]
Hansen, Bjorn Jervell [1 ]
Eian, Martin [3 ]
Mavroeidis, Vasileios [2 ]
机构
[1] Norwegian Def Res Estab FFI, Kjeller, Norway
[2] Univ Oslo, Oslo, Norway
[3] Mnemonic, Oslo, Norway
关键词
AI; neurosymbolic AI; cyber security; incident detection and response;
D O I
10.1007/978-3-031-71167-1_7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is generally accepted that all cyber attacks cannot be prevented, creating a need for the ability to detect and respond to cyber attacks. Both connectionist and symbolic AI are currently being used to support such detection and response. In this paper, we make the case for combining them using neurosymbolic AI. We identify a set of challenges when using AI today and propose a set of neurosymbolic use cases we believe are both interesting research directions for the neurosymbolic AI community and can have an impact on the cyber security field. We demonstrate feasibility through two proof-of-concept experiments.
引用
收藏
页码:119 / 140
页数:22
相关论文
共 50 条
  • [21] Neurosymbolic AI for Enhancing Instructability in Generative AI
    Sheth, Amit
    Pallagani, Vishal
    Roy, Kaushik
    IEEE INTELLIGENT SYSTEMS, 2024, 39 (05) : 5 - 11
  • [22] A Case Study on Defending against Cyber Crimes
    Sen, Amrita
    Jena, Gunamani
    Jena, Subhashree
    Devabalan, Dr P.
    JOURNAL OF PHARMACEUTICAL NEGATIVE RESULTS, 2022, 13 : 1931 - 1938
  • [23] Defending Against Backdoor Attacks by Quarantine Training
    Yu, Chengxu
    Zhang, Yulai
    IEEE ACCESS, 2024, 12 : 10681 - 10689
  • [24] Defending networks against denial of service attacks
    Gelenbe, E
    Gellman, M
    Loukas, G
    UNMANNED/UNATTENDED SENSORS AND SENSOR NETWORKS, 2004, 5611 : 233 - 243
  • [25] Defending against Sybil attacks in sensor networks
    Zhang, QH
    Wang, P
    Reeves, DS
    Ning, P
    25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 185 - 191
  • [26] An Adaptive Approach for Defending against DDoS Attacks
    Li, Muhai
    Li, Ming
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2010, 2010
  • [27] Defending against adversarial attacks by randomized diversification
    Taran, Olga
    Rezaeifar, Shideh
    Holotyak, Taras
    Voloshynovskiy, Slava
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 11218 - 11225
  • [28] Defending against denial of service attacks in scout
    Spatscheck, O
    Peterson, LL
    USENIX ASSOCIATION PROCEEDINGS OF THE THIRD SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI '99), 1999, : 59 - 72
  • [29] Defending against terrorist attacks with limited resources
    Powell, Robert
    AMERICAN POLITICAL SCIENCE REVIEW, 2007, 101 (03) : 527 - 541
  • [30] Monitoring network and defending against worm attacks
    Bo, Chen
    Fang, Bin-Xing
    Zheng, Jun
    Yun, Xiao-Chun
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 3363 - 3368